Chapter 5. Conclusions and Future Scope
|
|
- Ezra Powers
- 7 years ago
- Views:
Transcription
1 Chapter 5 Conclusions and Future Scope
2 CONCLUSIONS AND FUTURE SCOPE 5 The proposed method is evaluated on the FACE94 and other databases. It is shown that the proposed method outperforms all the compared state-of-the-art and baseline algorithms, which illustrates the robustness of the proposed method against the appearance variations of expression, lighting etc. The proposed method hopefully can inspire a new thinking and new way to tackle the face recognition problem. Performance of the proposed face recognition scheme has been tested upon three standard face databases, namely, the FACE94, ORL database and the YALE database. Extensive experiments are carried out in order to demonstrate the effectiveness of the proposed method for face recognition using proposed feature vectors. The recognition performance is investigated for different standard face databases consisting a range of different face images varying in facial expressions, lighting effects, and presence/absence of accessories. The performance of the proposed method in terms of recognition accuracy is obtained and compared with that of some recent methods. With the progress of time-frequency localization techniques, the robustness in face images based on signal processing techniques became comparable with statistical techniques. Spatial/frequency methods are suitable as there is variation in size, orientation and frequency of natural textures, Spatial/Spatial frequency methods are based on image representations that indicate frequency content in localized regions in the spatial domain. These methods overcome the shortcomings of the traditional Fourier based techniques. Such methods are able to achieve good localization in both the domains. They are consistent to human visual system theory. In this work, Wavelet based methods have been investigated. Using Daubechies wavelets, five level pyramidal decomposition has been implemented. Performance of all the methods presented in the thesis has been carried out. The method has been tested using three different classification schemes, and it has
3 Development of Feature Extraction Techniques for Face Recognition been proven to perform satisfactorily. FRR, FAR, Percentage Recognition has been considered for comparison. The recognition using DWT is 94%, by Entropy+Chi Square test it is 98%, by Entropy, Mutual information the result is 100%. This result is obtained with FFNN classifier. The result of Entropy, Mutual information, Chi- Square test, Entropy+Chi Square test is 98%, 92%, 80% and 94% respectively. This percentage of recognition is obtained with SOM classifier. Statistical methods such as Chi Square test have been studied. For face recognition, a new technique been developed. Feature performance has been tested by classifying the image dataset. Supervised and unsupervised classifier has been used to test the performance of all the features extracted in different methods. Entropy based features give comparable results with reduced computational burden. Due to its excellent performance, we expect that the proposed Entropy, Mutual information and Chi-Square test is applicable to other object recognition tasks as well. There are several directions where this work can be extended. Concept of Soft Computing can be used for automatic face recognition system. Using Soft Computing, neural network can be combined with fuzzy logic to enhance the performance of face recognition. Another avenue for research would be to implement other feature extraction technique on the same data set. In future, two or more classifiers can be combined to achieve better results. 125 Faculty of Computer Science and Engineering
4 LIST OF PUBLICATIONS 1. S.N. Kakarwal, Dr. R.R. Deshmukh, Performance Analysis of Face Recognition by Principal Component Analysis and Feed Forward Neural Network, International Journal of Engineering Innovations and Research, Vol.1 Issue 1, ISSN (online), pp , S.N. Kakarwal, Dr. R.R. Deshmukh, Hybrid Feature Extraction Technique for Face Recognition, International Journal of Advance Computer Science and Applications, Vol.3, No.2, ISSN (Online), 2012, pp S.N. Kakarwal, Dr. R.R. Deshmukh, Wavelet Transform based Feature Extraction for Face Recognition, International Journal of Computer Science and Applications, Issue-I, ISSN , pp , Jun S.N. Kakarwal, Dr. R.R. Deshmukh, Information Theory and Neural Network in based Approach for Face Recognition: A Review, International Journal of Recent Trends in Engineering, Vol. 2, No. 4, pp , Nov S.N. Kakarwal, Dr. R.R. Deshmukh, Face Recognition using Supervised Learning, WorldComp 2012, Las Vegas,USA, Jul S.N. Kakarwal, Dr. R.R. Deshmukh, Diverse Classifier for Face Recognition, International Conference ICKE 2011, ISBN , pp S.N. Kakarwal, S.D. Sapkal, Dr. R.R. Deshmukh, Analysis of Retina Recognition by Correlation and SVD, 2 nd International Conference on Advances in Computer Vision and Information Technology, pp , Dec S.N. Kakarwal, M.D. Malkauthekar, S.D. Sapkal, Dr. R.R. Deshmukh, Face Recognition Using FD and FFNN, IEEE International Advance Computing Conference at Patiala, pp , Mar
5 Development of Feature Extraction Techniques for Face Recognition 9. S.N. Kakarwal, Dr. V.R. Ratnaparkhe, Dr. R.R. Deshmukh, Multimodal Biometric Recognition based on Decision Level using Wavelet Transform, J.T. Mahajan College of Engg., Jalgaon, pp. 23, S.N. Kakarwal, S.D. Sapkal, Dr. R.R. Deshmukh, Face Recognition using Probabilistic Neural Network, National Level Conference on Recent Trends in Computers and Communications at Vidyalankar Institute of Technology, Mumbai, pp , Faculty of Computer Science and Engineering
6 International Journal of Engineering Innovation & Research Volume 1, Issue 1, ISSN : Performance Analysis of Face Recognition by Principal Component Analysis and Feed Forward Neural Network S.N. Kakarwal, R.R. Deshmukh Abstract In face recognition, it is important to select the invariant facial features especially faces with various poses and expression change. This paper presents novel technique for recognizing faces viz. PCA + FFNN. The experiment is performed over FERET faces. This technique gives results with considerable accuracy. Key Words Biometric, PCA and FFNN, Pattern Matching, FERET. I. INTRODUCTION Face recognition from still images and video sequence has been an active research area due to both its scientific challenges and wide range of potential applications such as biometric identity authentication, human-computer interaction, and video surveillance. Within the past two decades, numerous face recognition algorithms have been proposed as reviewed in the literature survey. Even though we human beings can detect and identify faces in a cluttered scene with little effort, building an automated system that accomplishes such objective is very challenging. The challenges mainly come from the large variations in the visual stimulus due to illumination conditions, viewing directions, facial expressions, aging, and disguises such as facial hair, glasses, or cosmetics [1]. Face Recognition focuses on recognizing the identity of a person from a database of known individuals. Face Recognition will find countless unobtrusive applications such as airport security and access control, building surveillance and monitoring Human-Computer Intelligent interaction and perceptual interfaces and Smart Environments at home, office and cars [2]. Within the last decade, face recognition (FR) has found a wide range of applications, from identity authentication, access control, and face-based video indexing/browsing, to human-computer interaction. Two issues are central to all these algorithms: 1) feature selection for face representation and 2) classification of a new face image based on the chosen feature representation. This work focuses on the issue of feature selection. Among various solutions to the problem, the most successful are those appearance-based approaches, which generally operate directly on images or appearances of face objects and process the images as two-dimensional (2-D) holistic patterns, to avoid difficulties associated with threedimensional (3-D) modeling, and shape or landmark detection [3]. The initial idea and early work of this research have been published in part as conference papers in [4], [5] and [6]. A recognition process involves a suitable representation, which should make the subsequent processing not only computationally feasible but also robust to certain variations in images. One method of face representation attempts to capture and define the face as a whole and exploit the statistical regularities of pixel intensity variations [7]. The remaining part of this paper is organized as follows. Section II extends to the pattern matching which also introduces and discusses the Principal Component Analysis and FFNN in detail. In Section III, extensive experiments on FERET are conducted to evaluate the performance of the proposed method on face recognition. Finally, conclusions are drawn in Section IV with some discussions. II. PATTERN MATCHING A. Pattern Recognition Methods During the past 30 years, pattern recognition has had a considerable growth. Applications of pattern recognition now include: character recognition; target detection; medical diagnosis; biomedical signal and image analysis; remote sensing; identification of human faces and of fingerprints; machine part recognition; automatic inspection; and many others. Traditionally, Pattern recognition methods are grouped into two categories: structural methods and feature space methods. Structural methods are useful in situation where the different classes of entity can be distinguished from each other by structural information, e.g. in character recognition different letters of the alphabet are structurally different from each other. The earliest-developed structural methods were the syntactic methods, based on using formal grammars to describe the structure of an entity [8]. The traditional approach to feature-space pattern recognition is the statistical approach, where the boundaries between the regions representing pattern classes in feature space are found by statistical inference based on a design set of sample patterns of known class membership [8]. Feature-space methods are useful in situations where the distinction between different pattern classes is readily expressible in terms of numerical measurements of this kind. The traditional goal of feature extraction is to characterize the object to be recognized by measurements whose values are very similar for objects in the same category, and very different for objects in different categories. This leads to the idea of seeking distinguishing features that are invariant to irrelevant transformations of the input. The task of the classifier Copyright 2012 IJEIR, All right reserved 40
7 (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. XXX, No. XXX, 2011 Hybrid Feature Extraction Technique for Face Recognition Sangeeta N. Kakarwal Department of Computer Science and Engineering P.E.S. College of Engineering Aurangabad, India Ratnadeep R. Deshmukh Department of Computer Science and IT Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India Abstract This paper presents novel technique for recognizing faces. The proposed method uses hybrid feature extraction techniques such as Chi square and entropy are combined together. Feed forward and Self organizing neural network are used for classification. We evaluate proposed method using FACE94 and ORL database and achieved better performance. Keywords-Biometric, Chi square test, Entropy, FFNN and SOM I. INTRODUCTION Face recognition from still images and video sequence has been an active research area due to both its scientific challenges and wide range of potential applications such as biometric identity authentication, human-computer interaction, and video surveillance. Within the past two decades, numerous face recognition algorithms have been proposed as reviewed in the literature survey. Even though we human beings can detect and identify faces in a cluttered scene with little effort, building an automated system that accomplishes such objective is very challenging. The challenges mainly come from the large variations in the visual stimulus due to illumination conditions, viewing directions, facial expressions, aging, and disguises such as facial hair, glasses, or cosmetics [1]. Face Recognition focuses on recognizing the identity of a person from a database of known individuals. Face Recognition will find countless unobtrusive applications such as airport security and access control, building surveillance and monitoring Human-Computer Intelligent interaction and perceptual interfaces and Smart Environments at home, office and cars [2]. Within the last decade, face recognition (FR) has found a wide range of applications, from identity authentication, access control, and face-based video indexing/browsing, to humancomputer interaction.two issues are central to all these algorithms: 1) feature selection for face representation and 2) classification of a new face image based on the chosen feature representation. This work focuses on the issue of feature selection. Among various solutions to the problem, the most successful are those appearance-based approaches, which generally operate directly on images or appearances of face objects and process the images as two-dimensional (2-D) holistic patterns, to avoid difficulties associated with threedimensional (3-D) modeling, and shape or landmark detection [3]. The initial idea and early work of this research have been published in part as conference papers in [4], [5] and [6]. A recognition process involves a suitable representation, which should make the subsequent processing not only computationally feasible but also robust to certain variations in images. One method of face representation attempts to capture and define the face as a whole and exploit the statistical regularities of pixel intensity variations [7]. The remaining part of this paper is organized as follows. Section II extends to the pattern matching which also introduces and discusses the Chi square test, Entropy and FFNN and SOM in detail. In Section III, extensive experiments on FACE94 and ORL faces are conducted to evaluate the performance of the proposed method on face recognition. Finally, conclusions are drawn in Section IV with some discussions. II. PATTERN MATCHING A. Pattern Recognition Methods During the past 30 years, pattern recognition has had a considerable growth. Applications of pattern recognition now include: character recognition; target detection; medical diagnosis; biomedical signal and image analysis; remote sensing; identification of human faces and of fingerprints; machine part recognition; automatic inspection; and many others. Traditionally, Pattern recognition methods are grouped into two categories: structural methods and feature space methods. Structural methods are useful in situation where the different classes of entity can be distinguished from each other by structural information, e.g. in character recognition different letters of the alphabet are structurally different from each other. The earliest-developed structural methods were the syntactic methods, based on using formal grammars to describe the structure of an entity [8]. The traditional approach to feature-space pattern recognition is the statistical approach, where the boundaries between the regions representing pattern classes in feature space are found by statistical inference based on a design set of sample patterns of known class membership [8]. Feature-space methods are useful in situations where the distinction between different pattern classes is readily expressible in terms of 1 P age
8 International Journal of Computer Science and Application Issue 2010 ISSN Wavelet Tr ansfor m based Feature Extr action for Face Recognition Sangeeta Kakarwal, Ratnadeep Deshmukh Abstract - In this paper, we propose a Wavelet Transform based analysis method for Face Recognition. This algorithm has been used to extract the features of the FERET face database. Results indicate that the proposed methodology is able to achieve excellent performance with only a very small set of features being used, and its error rate is calculated using FAR and FRR. The choice of the Wavelet transform in this setting is motivated by its insensitivity to large variation in light direction, face pose, and facial expression. In the experiments we used Correlation and Threshold values to assure high consistency of the produced classification ou t com es. T h e en cou r a gin g exp er im en t a l r esu lt s demonstrated that the proposed approach by using frontal and side-view images is a feasible and effective solution to recognizing faces, which can lead to a better and practical use of existing forensic databases in computerized human facerecognition applications. KeyWords- AFR (Automatic Face Recognition), FERET, FAR (FalseAcceptance Rate), FRR (False Rejection Rate). I. INTRODUCTION Face recognition from still images and video sequence has been an active research area due to both its scientific challenges and wide range of potential applications such as biometric identity authentication, human-computer interaction, and video surveillance. Within the past two decades, numerous face recognition algorithms have been proposed as reviewed in the literature survey. Even though we human beings can detect and identify faces in a cluttered scene with little effort, building an automated system that accomplishes such objective is very challenging. The challenges mainly come from the large variations in the visual stimulus due to illumination conditions, viewing directions, facial expressions, aging, and disguises such as facial hair, glasses, or cosmetics [1]. Face Recognition focuses on recognizing the identity of a person from a database of known individuals. Face Recognition will find countless unobtrusive applications such as airport security and access control, building surveillance and monitoring Human-Computer Intelligent interaction and perceptual interfaces and Smart Environments at home, office and cars [2]. Within the last decade, face recognition (FR) has found a wide range of applications, from identity authentication, access control, and face-based video indexing/browsing, to human-computer interaction/communication. Two issues are central to all these algorithms: 1) feature selection for face representation and 2) classification of a new face image based on the chosen feature representation. This work focuses on the issue of feature selection. Among various solutions to the problem, the most successful are those appearance-based approaches, which generally operate directly on images or appearances of face objects and process the images as two-dimensional (2-D) holistic patterns, to avoid difficulties associated with threedimensional (3-D) modeling, and shape or landmark detection [3]. The initial idea and early work of this research have been published in part as conference papers in [4], [5]. A recognition process involves two basic computational stages: In a first stage a suitable representation is chosen, which should make the subsequent processing not only computationally feasible but also robust to certain variations in images. One method of face representation attempts to capture and define the face as a whole and exploit the statistical regularities of pixel intensity variations [6]. We have used Wavelet transform to decompose face images and classified it with correlation and different threshold values. The remaining part of this paper is organized as follows. Section II extends to the feature mapping, which also introduces and discusses the Wavelet Transform in detail. In Section III, extensive experiments on FERET databases are conducted to evaluate the performance of the proposed method on face recognition. Finally, conclusions are drawn in Section IV with some discussions. II. PATTERN MATCHING A. Pattern Recognition Methods In communication with the outer world, one of the most important goals for human beings is to recognize objects. For example, from an image, image set, or image sequence of objects, we need to recognize that the objects are oriented toward, where they are located, how they are arranged, what size and shape they have, and what sort of things they are. During the past 30 years, pattern recognition has had a considerable growth. Applications of pattern recognition now include: character recognition; target detection; medical diagnosis; biomedical signal and image analysis; remote sensing; identification of human faces and of fingerprints; machine part recognition; automatic 100
9 REVIEW PAPER International Journal of Recent Trends in Engineering, Vol 2, No. 4, November 2009 Information Theory and Neural Network based Approach for Face Recognition: A Review S.N. Kakarwal 1, Dr. R.R. Deshmukh 2 1 P.E.S. College of Engineering, Department of Computer Science and Engineering, Aurangabad, India s_kakarwal@yahoo.com 2 Dr. Babasaheb Ambedkar Marathwada University, Department of Computer Science and Information Technology, Aurangabad, India ratnadeep_deshmukh@yahoo.co.in Abstract In face recognition, it is important to select the invariant facial features especially faces with various pose and expression changes. This paper presents novel feature extraction techniques such as Entropy and Mutual Information and for classification Feed forward neural network is used, which will be better than traditional methods for accurately recognizing the faces. Index Terms Biometrics, Information Theory, Entropy and mutual information and Feed forward neural network. I. BIOMETRICS Biometric can be defined as technique of studying physical characteristics of a person such as fingerprints, hand geometry, eye structure etc. to establish his or her identity. Biometrics-based personal identification techniques that use physiological or behavioral characteristics are becoming increasingly popular compared to traditional token-based or knowledge based techniques such as identification cards (ID), passwords, etc. One of the main reasons for this popularity is the ability of the biometrics technology to differentiate between an authorized person and an impostor who fraudulently acquires the access privilege of an authorized person [1]. Popular pattern recognition paradigms based on data reduction, such as redundancy reduction and dimensionality reduction, have met with difficulties in solving complex pattern recognition problems, such as the human face recognition problem [2]. A brief description of some commonly used biometrics is given below: A. Face Face recognition is a non-intrusive method, and facial images are probably the most common biometric characteristic used by humans to make personal recognition. The most popular approaches to face recognition are based on either: 1) the location and shape of facial attributes, such as the eyes, eyebrows, nose, lips, and chin and their spatial relationships or 2) the overall (global) analysis of the face image that represents a face as a weighted combination of a number of canonical faces. While the authentication performance of the face recognition systems that are commercially available is reasonable, they impose a number of restrictions on how the facial images are obtained, often requiring a fixed and simple background or special illumination. These systems also have difficulty in matching face images captured 2009 ACADEMY PUBLISHER 176 from two drastically different views and under different illumination conditions (i.e., varying temporal contexts). B. Fingerprint Humans have used fingerprints for personal identification for many decades and the matching (i.e., identification) accuracy using fingerprints has been shown to be very high. A fingerprint is the pattern of ridges and valleys on the surface of a fingertip, the formation of which is determined during the first seven months of fetal development. One problem with the current fingerprint recognition systems is that they require a large amount of computational resources, especially when operating in the identification mode. Finally, fingerprints of a small fraction of the population may be unsuitable for the automatic identification because of genetic factors, aging, environmental, or occupational reasons [3]. C. Retina The retinal vasculature is rich in structure and is supposed to be a characteristic of each individual and each eye. It is claimed to be the most secure biometric since it is not easy to change or replicate the retinal vasculature. The image acquisition requires a person to peep into an eye-piece and focus on a specific spot in the visual field so that a predetermined part of the retinal vasculature could be imaged. The image acquisition involves cooperation of the subject, entails contact with the eyepiece, and requires a conscious effort on the part of the user. All these factors adversely affect the public acceptability of retinal biometric [4]. In the Table I comparison of various Biometric Techniques is given [5]: TABLE I COMPARISON OF VARIOUS BIOMETRIC TECHNIQUES Rank Accuracy Convenience Cost 1 DNA Voice Voice 2 Iris Face Signature 3 Retina Signature Finger 4 Finger Finger Face 5 Face Iris Iris 6 Signature Retina Retina 7 Voice DNA DNA
10
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationFace Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park
Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,
More informationFACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationIntroduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationHANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
More informationAN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
More informationSimultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong a28wong@uwaterloo.ca William Bishop wdbishop@uwaterloo.ca Department of Electrical and Computer Engineering University
More informationKeywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
More informationMathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
More informationFace Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
More informationTIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content
More informationThis method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More informationNAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE. Venu Govindaraju
NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE Venu Govindaraju BIOMETRICS DOCUMENT ANALYSIS PATTERN RECOGNITION 8/24/2015 ICDAR- 2015 2 Towards a Globally Optimal Approach for Learning Deep Unsupervised
More informationClassification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
More informationaddressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationBiometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
More informationEfficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
More informationDiscriminative Multimodal Biometric. Authentication Based on Quality Measures
Discriminative Multimodal Biometric Authentication Based on Quality Measures Julian Fierrez-Aguilar a,, Javier Ortega-Garcia a, Joaquin Gonzalez-Rodriguez a, Josef Bigun b a Escuela Politecnica Superior,
More informationDESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
More informationA secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationMay 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.
More information3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company
3M Cogent, Inc. White Paper Facial Recognition Biometric Technology a 3M Company Automated Facial Recognition: Turning Promise Into Reality Once the province of fiction, automated facial recognition has
More informationModelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
More informationUsing Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
More informationOpen issues and research trends in Content-based Image Retrieval
Open issues and research trends in Content-based Image Retrieval Raimondo Schettini DISCo Universita di Milano Bicocca schettini@disco.unimib.it www.disco.unimib.it/schettini/ IEEE Signal Processing Society
More informationMethod of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
More informationFramework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
More informationTemplate-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
More informationSubspace Analysis and Optimization for AAM Based Face Alignment
Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China zhaoming1999@zju.edu.cn Stan Z. Li Microsoft
More informationPSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
More informationSub-pixel mapping: A comparison of techniques
Sub-pixel mapping: A comparison of techniques Koen C. Mertens, Lieven P.C. Verbeke & Robert R. De Wulf Laboratory of Forest Management and Spatial Information Techniques, Ghent University, 9000 Gent, Belgium
More informationUSABILITY OF A FILIPINO LANGUAGE TOOLS WEBSITE
USABILITY OF A FILIPINO LANGUAGE TOOLS WEBSITE Ria A. Sagum, MCS Department of Computer Science, College of Computer and Information Sciences Polytechnic University of the Philippines, Manila, Philippines
More informationA Various Biometric application for authentication and identification
A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,
More informationFalse alarm in outdoor environments
Accepted 1.0 Savantic letter 1(6) False alarm in outdoor environments Accepted 1.0 Savantic letter 2(6) Table of contents Revision history 3 References 3 1 Introduction 4 2 Pre-processing 4 3 Detection,
More informationSynthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition
Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition Paulo Marques 1 Instituto Superior de Engenharia de Lisboa / Instituto de Telecomunicações R. Conselheiro Emídio
More informationATM Transaction Security Using Fingerprint/OTP
ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering
More informationFPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
More informationThe Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
More informationBiometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationMULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,
More informationUser Authentication Methods for Mobile Systems Dr Steven Furnell
User Authentication Methods for Mobile Systems Dr Steven Furnell Network Research Group University of Plymouth United Kingdom Overview The rise of mobility and the need for user authentication A survey
More informationIndex Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
More informationAn Experimental Study of the Performance of Histogram Equalization for Image Enhancement
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 216 E-ISSN: 2347-2693 An Experimental Study of the Performance of Histogram Equalization
More informationAn Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
More informationA Partially Supervised Metric Multidimensional Scaling Algorithm for Textual Data Visualization
A Partially Supervised Metric Multidimensional Scaling Algorithm for Textual Data Visualization Ángela Blanco Universidad Pontificia de Salamanca ablancogo@upsa.es Spain Manuel Martín-Merino Universidad
More informationPerformance Comparison of Visual and Thermal Signatures for Face Recognition
Performance Comparison of Visual and Thermal Signatures for Face Recognition Besma Abidi The University of Tennessee The Biometric Consortium Conference 2003 September 22-24 OUTLINE Background Recognition
More informationAnalecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
More informationINTRODUCTION TO MACHINE LEARNING 3RD EDITION
ETHEM ALPAYDIN The MIT Press, 2014 Lecture Slides for INTRODUCTION TO MACHINE LEARNING 3RD EDITION alpaydin@boun.edu.tr http://www.cmpe.boun.edu.tr/~ethem/i2ml3e CHAPTER 1: INTRODUCTION Big Data 3 Widespread
More informationPalmprint Recognition with PCA and ICA
Abstract Palmprint Recognition with PCA and ICA Tee Connie, Andrew Teoh, Michael Goh, David Ngo Faculty of Information Sciences and Technology, Multimedia University, Melaka, Malaysia tee.connie@mmu.edu.my
More informationVoice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India rahulrsharma999@gmail.com Abstract: Voice authentication system captures the
More informationEnvironmental Remote Sensing GEOG 2021
Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class
More informationPrediction of Heart Disease Using Naïve Bayes Algorithm
Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,
More informationINTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
More informationA Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. lavanya.kk2005@gmail.com C.Naga Raju Associate Professor
More informationISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining
A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,
More informationObject Recognition and Template Matching
Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of
More informationFace Model Fitting on Low Resolution Images
Face Model Fitting on Low Resolution Images Xiaoming Liu Peter H. Tu Frederick W. Wheeler Visualization and Computer Vision Lab General Electric Global Research Center Niskayuna, NY, 1239, USA {liux,tu,wheeler}@research.ge.com
More informationMicrocontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
More informationA PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir
More informationEFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
More informationA Simple Feature Extraction Technique of a Pattern By Hopfield Network
A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani
More informationA Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationIDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION
http:// IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION Harinder Kaur 1, Raveen Bajwa 2 1 PG Student., CSE., Baba Banda Singh Bahadur Engg. College, Fatehgarh Sahib, (India) 2 Asstt. Prof.,
More informationSupervised and unsupervised learning - 1
Chapter 3 Supervised and unsupervised learning - 1 3.1 Introduction The science of learning plays a key role in the field of statistics, data mining, artificial intelligence, intersecting with areas in
More informationENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationTracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
More informationBEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
More informationHSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee
More informationSURVEILLANCE ENHANCED FACE RECOGNITION
SURVEILLANCE ENHANCED FACE RECOGNITION BIOMETRICS Face Recognition Biometrics technology has matured rapidly over recent years, and the use of it for security and authentication purposes has become increasingly
More informationUser Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
More informationBiometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
More informationOpen Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
More informationIllumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications
Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications Shireesha Chintalapati #1, M. V. Raghunadh *2 Department of E and CE NIT Warangal, Andhra
More informationAnalysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
More informationAutomatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
More informationDan French Founder & CEO, Consider Solutions
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
More informationAUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
More informationSYMMETRIC EIGENFACES MILI I. SHAH
SYMMETRIC EIGENFACES MILI I. SHAH Abstract. Over the years, mathematicians and computer scientists have produced an extensive body of work in the area of facial analysis. Several facial analysis algorithms
More informationFRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE Ms. S.Revathi 1, Mr. T. Prabahar Godwin James 2 1 Post Graduate Student, Department of Computer Applications, Sri Sairam
More informationICSES Journal on Image Processing and Pattern Recognition (IJIPPR), Aug. 2015, Vol. 1, No. 1
2 ICSES Journal on Image Processing and Pattern Recognition (IJIPPR), Aug. 2015, Vol. 1, No. 1 1. About ICSES Journal on Image Processing and Pattern Recognition (IJIPPR) The ICSES Journal on Image Processing
More informationKNOWLEDGE-BASED IN MEDICAL DECISION SUPPORT SYSTEM BASED ON SUBJECTIVE INTELLIGENCE
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 22/2013, ISSN 1642-6037 medical diagnosis, ontology, subjective intelligence, reasoning, fuzzy rules Hamido FUJITA 1 KNOWLEDGE-BASED IN MEDICAL DECISION
More informationILLUMINATION NORMALIZATION BASED ON SIMPLIFIED LOCAL BINARY PATTERNS FOR A FACE VERIFICATION SYSTEM. Qian Tao, Raymond Veldhuis
ILLUMINATION NORMALIZATION BASED ON SIMPLIFIED LOCAL BINARY PATTERNS FOR A FACE VERIFICATION SYSTEM Qian Tao, Raymond Veldhuis Signals and Systems Group, Faculty of EEMCS University of Twente, the Netherlands
More informationPIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,
More informationDigital image processing
746A27 Remote Sensing and GIS Lecture 4 Digital image processing Chandan Roy Guest Lecturer Department of Computer and Information Science Linköping University Digital Image Processing Most of the common
More informationClassroom Monitoring System by Wired Webcams and Attendance Management System
Classroom Monitoring System by Wired Webcams and Attendance Management System Sneha Suhas More, Amani Jamiyan Madki, Priya Ranjit Bade, Upasna Suresh Ahuja, Suhas M. Patil Student, Dept. of Computer, KJCOEMR,
More informationPersonal Identification Techniques Based on Operational Habit of Cellular Phone
Proceedings of the International Multiconference on Computer Science and Information Technology pp. 459 465 ISSN 1896-7094 c 2006 PIPS Personal Identification Techniques Based on Operational Habit of Cellular
More informationHAND GESTURE BASEDOPERATINGSYSTEM CONTROL
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL Garkal Bramhraj 1, palve Atul 2, Ghule Supriya 3, Misal sonali 4 1 Garkal Bramhraj mahadeo, 2 Palve Atule Vasant, 3 Ghule Supriya Shivram, 4 Misal Sonali Babasaheb,
More informationBiometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
More informationMachine Learning. 01 - Introduction
Machine Learning 01 - Introduction Machine learning course One lecture (Wednesday, 9:30, 346) and one exercise (Monday, 17:15, 203). Oral exam, 20 minutes, 5 credit points. Some basic mathematical knowledge
More informationWHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
More informationARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
More informationCredit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
More informationA STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
More informationFingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
More information